Hacker News new | past | comments | ask | show | jobs | submit | from login
Why is unauthenticated encryption insecure? (cybergibbons.com)
2 points by fanf2 40 days ago | past
Why What3Words is not suitable for safety critical applications (cybergibbons.com)
63 points by oftenwrong on May 6, 2021 | past | 35 comments
Why What3Words is not suitable for safety critical applications (cybergibbons.com)
3 points by oftenwrong on May 3, 2021 | past | 3 comments
What3Words – The Algorithm (cybergibbons.com)
305 points by ykat7 on May 2, 2021 | past | 176 comments
Why What3Words is not suitable for safety critical applications (cybergibbons.com)
2 points by DyslexicAtheist on April 30, 2021 | past
Why What3Words is not suitable for safety critical applications (cybergibbons.com)
7 points by leafy-suburb on April 29, 2021 | past
A Warning to Users of NurseryCam (cybergibbons.com)
167 points by carwyn on Feb 14, 2021 | past | 72 comments
Reading and writing firmware on an STM32 using the serial bootloader (cybergibbons.com)
1 point by todsacerdoti on Nov 5, 2020 | past
Why is unauthenticated encryption insecure? (cybergibbons.com)
63 points by todsacerdoti on Sept 20, 2020 | past | 38 comments
BC Vault – is their security model better? (cybergibbons.com)
2 points by agent_random on Feb 2, 2020 | past
Eternal Vigilance Is the Price of Liberty (cybergibbons.com)
17 points by DyslexicAtheist on June 30, 2019 | past | 1 comment
The Bitfi hardware wallet isn’t “unhackable” (cybergibbons.com)
2 points by DyslexicAtheist on July 29, 2018 | past | 1 comment
CSL Dualcom CS2300-R signalling unit vulnerabilities (cybergibbons.com)
6 points by GeorgeHahn on Nov 28, 2015 | past
Another example of why you shouldn't roll-your-own crypto (cybergibbons.com)
12 points by cybergibbons on Nov 27, 2015 | past | 1 comment
Why does the “WEMAGIN: INTERNET PRIVACY GADGET” look like snake-oil? (cybergibbons.com)
1 point by cybergibbons on Nov 14, 2014 | past
Heatmiser WiFi thermostat vulnerabilities (cybergibbons.com)
6 points by cybergibbons on Sept 22, 2014 | past
Reverse engineering a wireless burglar alarm, part 1 (cybergibbons.com)
3 points by DanBC on Aug 15, 2013 | past

Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: